首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Authentication codes and bipartite graphs
Authors:Rongquan Feng  Lei Hu  Jin Ho Kwak  
Institution:aLMAM, School of Mathematical Sciences, Peking University, Beijing 100871, PR China;bState Key Laboratory of Information Security, (Graduate School of Chinese Academy of Sciences), Beijing 100039, PR China;cMathematics, Pohang University of Science and Technology, Pohang 790-784, Republic of Korea
Abstract:In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By using such a characterization, two necessary and sufficient conditions for a minimal authentication code with perfect secrecy are derived. The probabilities of a successful impersonation and of a successful substitution attack are discussed. As a result, some (optimal) minimal authentication codes with perfect secrecy are constructed from association schemes, from finite groups or from known authentication codes no matter whether the known ones are with or without secrecy.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号